International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also get this service via

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

Filter (AND): ACBookCHESConfCryptoECElectionEventFSEForumJoCJobNewNewsPKCPhDPubReviewServiceSoftwareTCCUpdateePrint

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 [ 47 ] 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
2012-04-23
00:17 [Pub][ePrint]Private Fingerprint Matching, by Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona[ expand ]
00:17 [Pub][ePrint]Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams, by T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu[ expand ]
00:17 [Pub][ePrint]Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir[ expand ]
00:17 [Pub][ePrint]Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts, by Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler[ expand ]
00:17 [Pub][ePrint]Quadratic Span Programs and Succinct NIZKs without PCPs, by Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova[ expand ]
00:17 [Pub][ePrint]Automatic Search of Truncated Impossible Differentials and Applications, by Shengbao Wu, Mingsheng Wang[ expand ]
00:17 [Pub][ePrint]Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions, by Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong[ expand ]
00:17 [Pub][ePrint]Almost-Everywhere Secure Computation with Edge Corruptions, by Nishanth Chandran and Juan Garay and Rafail Ostrovsky[ expand ]


2012-04-22
09:17 [Pub][ePrint]Cryptanalysis of Hummingbird-2, by Kai Zhang, Lin Ding and Jie Guan[ expand ]
09:17 [Pub][ePrint](Pseudo) Preimage Attack on Round-Reduced Gr{\\o}stl Hash Function and Others (Extended Version), by Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou[ expand ]


2012-04-18
18:01 [PhD][New]Tolga Acar: High-Speed Algorithms & Architectures For Number-Theoretic Cryptosystems[ expand ]
16:52 [Event][Update]FSE 2013: Fast Software Encryption[ expand ]
08:17 [Event][New]FSE 2013: Fast Software Encryption[ expand ]


2012-04-17
21:12 [Event][New]STM 2012: 8th International Workshop on Security and Trust Management[ expand ]
18:42 [News]Fellows 2012[ expand ]


2012-04-16
23:01 [News]IACR Minutes[ expand ]
08:05 [News]Double Crypto? - on Publication Bandwidth[ expand ]
07:53 [Conf][FSE]Report on FSE 2012[ expand ]
00:17 [Pub][ePrint]Information-flow control for programming on encrypted data, by J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman[ expand ]



2012-04-15
15:59 [Event][New]Eurocrypt 2013[ expand ]


2012-04-14
18:11 [Event][New]CANS 2012: The 11th International Conference on Cryptology and Network Security[ expand ]
06:46 [Event][Update]FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography[ expand ]


2012-04-13
18:17 [Pub][ePrint]Comment an Anonymous Multi-receiver Identity-based Encryption Scheme, by J.H.Zhang, Y.B.cui[ expand ]
18:17 [Pub][ePrint]Unique Group Signatures, by Matthew Franklin and Haibin Zhang[ expand ]
18:17 [Pub][ePrint]Robust biometric-based user authentication scheme for wireless sensor networks, by Debiao He[ expand ]
18:17 [Pub][ePrint]Secure Similarity Coefficients Computation with Malicious Adversaries, by Bo Zhang and Fangguo Zhang[ expand ]
09:17 [Pub][ePrint]On the Security of an Improved Password Authentication Scheme Based on ECC, by Ding Wang and Chun-guang Ma[ expand ]
09:17 [Pub][ePrint]On The Security of One-Witness Blind Signature Schemes, by Foteini Baldimtsi and Anna Lysyanskaya[ expand ]
09:17 [Pub][ePrint]Multi-Instance Security and its Application to Password-Based Cryptography, by Mihir Bellare and Stefano Tessaro and Thomas Ristenpart[ expand ]
09:17 [Pub][ePrint]The BlueJay Ultra-Lightweight Hybrid Cryptosystem , by Markku-Juhani O. Saarinen[ expand ]
09:17 [Pub][ePrint]A Multivariate based Threshold Ring Signature Scheme, by Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann[ expand ]
09:17 [Pub][ePrint]An Efficient Homomorphic Encryption Protocol for Multi-User Systems, by Liangliang Xiao and Osbert Bastani and I-Ling Yen[ expand ]
09:17 [Pub][ePrint]Extending Order Preserving Encryption for Multi-User Systems, by Liangliang Xiao and I-Ling Yen and Dung T. Huynh[ expand ]
09:17 [Pub][ePrint]Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes, by Liangliang Xiao and I-Ling Yen[ expand ]
09:17 [Pub][ePrint]Aggregate Signcryption, by Alexander W. Dent[ expand ]
09:17 [Pub][ePrint]Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm, by Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault[ expand ]
09:17 [Pub][ePrint]Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures, by Jae Hong Seo and Jung Hee Cheon[ expand ]
08:59 [Event][New]Provable Privacy Workshop[ expand ]


2012-04-12
07:49 [News]CryptoDB updates[ expand ]



2012-04-11
21:17 [Pub][ePrint]Third-order nonlinearities of some biquadratic monomial Boolean functions, by Brajesh Kumar Singh[ expand ]
21:17 [Pub][ePrint]Replay attacks that violate ballot secrecy in Helios, by Ben Smyth[ expand ]
21:17 [Pub][ePrint]SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version), by Christian Wachsmann and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar[ expand ]
21:17 [Pub][ePrint]Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification, by Xin Li[ expand ]
21:17 [Pub][ePrint]Universally Composable Key-Management, by Steve Kremer and Robert Künnemann and Graham Steel[ expand ]
18:17 [Pub][ePrint]Quantum Money from Hidden Subspaces, by Scott Aaronson and Paul Christiano[ expand ]
18:17 [Pub][ePrint]Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication, by Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz[ expand ]
18:17 [Pub][ePrint]Zero Knowledge with Rubik\'s Cubes, by Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF[ expand ]
18:17 [Pub][ePrint]Automatically Verified Mechanized Proof of One-Encryption Key Exchange, by Bruno Blanchet[ expand ]
18:17 [Pub][ePrint]Optimal First-Order Masking with Linear and Non-Linear Bijections, by Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER[ expand ]
18:17 [Pub][ePrint]Everlasting Quantum Security, by Unruh, Dominique[ expand ]
18:17 [Pub][ePrint]Improvements of Algebraic Attacks Based on Structured Gaussian Elimination, by Satrajit Ghosh and Abhijit Das[ expand ]
18:17 [Pub][ePrint]Towards Billion-Gate Secure Computation with Malicious Adversaries, by Benjamin Kreuter and abhi shelat and Chih-hao Shen[ expand ]
18:17 [Pub][ePrint]Eperio: Mitigating Technical Complexity in Cryptographic Election Verification, by Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams[ expand ]
18:17 [Pub][ePrint]Yet Another SHA-3 Round 3 FPGA Results Paper, by Brian Baldwin and William P. Marnane[ expand ]
18:17 [Pub][ePrint]How to Construct Quantum Random Functions, by Mark Zhandry[ expand ]
18:17 [Pub][ePrint]Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange, by Nils Fleischhacker and Mark Manulis and Amir Sadr-Azodi[ expand ]
18:17 [Pub][ePrint]Asymptotic fingerprinting capacity in the Combined Digit Model, by Dion Boesten and Boris Skoric[ expand ]
18:17 [Pub][ePrint]Differentially Private Smart Metering with Battery Recharging, by Michael Backes and Sebastian Meiser[ expand ]
07:42 [News]Web-Site Update of the IACR[ expand ]


2012-04-09
16:20 [Job][New]Senior Lecturer of Theoretical Computer Science, University of Tartu, Estonia[ expand ]
16:19 [Event][New]ASK 2012: The Second Asian Workshop on Symmetric Key Cryptography[ expand ]
16:18 [Event][New]ACSAT: Conference on Advanced Computer Science Applications and Technology[ expand ]
06:17 [Job][New]Postdoctoral Research Associate in Hardware Trust and Security, Polytechnic Institute of New York University, USA[ expand ]


2012-04-06
18:07 [Event][New]ICISC '12: International Conference on Information Security and Cryptology[ expand ]


2012-04-05
18:42 [Job][New]PhD Position in Engineering Cryptographic Protocols , EC SPRIDE - European Center for Security and Privacy by Design, TU Darmstadt, Germany [ expand ]
18:34 [Event][New]ERCIM News 90: ERCIM News: Special Issue on Cybercrime and privacy issues[ expand ]
18:33 [Job][New]Postdoctoral Researcher, University of Maryland, USA[ expand ]



2012-04-03
09:11 [Event][Update]ESORICS 2012: 17th European Symposium on Research in Computer Security[ expand ]


2012-04-01
12:39 [Pub][ePrint]Approaches for the performance increasing of software implementation of integer multiplication in prime fields, by Vladislav Kovtun and Andrew Okhrimenko[ expand ]
12:39 [Pub][ePrint]Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers, by Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan[ expand ]
12:39 [Pub][ePrint]A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes, by Val\\\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich[ expand ]
12:20 [Pub][JoC]Mercurial Commitments with Applications to Zero-Knowledge Sets[ expand ]
12:20 [Pub][JoC]A Note on the Bivariate Coppersmith Theorem[ expand ]
12:20 [Pub][JoC]On the Analysis of Cryptographic Assumptions in the Generic Ring Model[ expand ]
12:20 [Pub][JoC]A Single-Key Attack on the Full GOST Block Cipher[ expand ]


2012-03-30
08:05 [Job][Update]Ph.D scholarship, Newcastle University, UK[ expand ]
08:05 [Job][New]Ph.D scholarship, Newcastle University[ expand ]


2012-03-29
13:16 [PhD][Update]Joppe W. Bos: On the Cryptanalysis of Public-Key Cryptography[ expand ]
05:26 [Event][New]MIST 2012: Managing Insider Security Threats[ expand ]



2012-03-28
15:42 [Event][New]ICISS 2012: 8th International Conference on Information Systems Security 2012[ expand ]
11:01 [Event][Update]SCN 2012: 8th Conference on Security and Cryptography for Networks[ expand ]
05:35 [Event][New]MMM-ACNS-2012: Sixth International Conference MMM-ACNS-2012[ expand ]


2012-03-27
07:32 [Event][New]SecureComm 2012: 8th International Conference on Security and Privacy in Communication Netwo[ expand ]
07:29 [Job][New]Lecturer/Senior Lecturer in Computing (incl. IT Security and Crypto), 2 Positions, University of Surrey, United Kingdom[ expand ]


2012-03-26
11:18 [PhD][New]Joppe W. Bos: On the Cryptanalysis of Public-Key Cryptography[ expand ]
11:18 [PhD][New]Arjen K. Lenstra[ expand ]


2012-03-25
21:07 [PhD][New]Abdoul Aziz Ciss: Arithmétique et Extracteurs déterministes sur les courbes elliptiques[ expand ]
21:06 [PhD][New]Djiby Sow: Semi-modules[ expand ]
21:06 [PhD][New]Université Cheikh Anta Diop de Dakar-Sénégal[ expand ]



2012-03-23
14:11 [Event][New]CrossFyre 2012: Workshop on Cryptography, Robustness, and Provably Secure Schemes for Femal[ expand ]
06:41 [Event][New]CBC 2012: Code-based Cryptography Workshop 2012[ expand ]
06:40 [Event][New]DIAC: Directions in Authenticated Ciphers[ expand ]
06:40 [Event][New]IWDW'12: 11th International Workshop on Digital Forensics and Watermarking[ expand ]


2012-03-22
21:26 [Job][New]Post-Doc, Aalto University, Department of Information and Computer Science, Espoo, Finland[ expand ]


2012-03-20
21:49 [Job][New]Postdoc in Game Theoretic Privacy-Preservation applied to Data Mining, Loughborough University, UK[ expand ]
21:48 [PhD][Update]Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques[ expand ]
21:25 [Event][Update]CMS'2012: Communications and Multimedia Security[ expand ]


2012-03-19
07:46 [Event][New]ISC '12: Information Security Conference[ expand ]



2012-03-17
12:24 [Event][New]MoCrySEn 2012: 1st International Workshop on Modern Cryptography and Security Engineering[ expand ]


2012-03-16
11:14 [Job][New]Senior Cryptographer, Advanced Micro Devices (AMD) in Markham, Canada (Toronto Area)[ expand ]
11:14 [Job][New]Research Scientists in Cryptography, Temasek Laboraories, National University of Singapore, Singapore[ expand ]


2012-03-15
18:54 [Event][New]ICICS 2012: The 14th International Conference on Information and Communications Securit[ expand ]


2012-03-14
15:44 [Job][New]PhD Position in Public-Key Cryptography, Interdisciplinary Centre for Security, Reliability and Trust (SnT)[ expand ]
13:48 [Conf][EC]Conference Android App is now available[ expand ]
08:53 [PhD][New]Pierrick Gaudry[ expand ]
08:53 [PhD][New]Gaetan Bisson: Endomorphism Rings in Cryptography[ expand ]



2012-03-13
17:20 [Event][New]FDTC: Workshop on Fault Diagnosis and Tolerance in Cryptography[ expand ]
09:23 [Event][New]Workshop on the Theory and Practice of Multiparty Computation[ expand ]
07:16 [Job][New]Research Scientists (System Security), A*STAR, Data Storage Institute, Singapore[ expand ]


2012-03-12
15:00 [Event][New]SPACE'12: Int. Conference on Security, Privacy and Applied Cryptography Engineering[ expand ]
13:34 [Job][New]Qua­li­fi­ca­ti­ons Fel­lows (DFG - Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
13:10 [Job][New]Ph.D. (DFG-Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
12:52 [Job][New]Post Doc (DFG - Research Training Group), Horst Görtz Institute for IT-Security[ expand ]
05:57 [Event][New]ACSA-SUMMER 2012: FTRA Int. Symp. on Advances in Cryptography, Security and Applications[ expand ]


2012-03-11
19:13 [Conf][EC]Early registration deadline is this week. To save money book now.[ expand ]


2012-03-10
16:36 [Event][New]CTCrypt 2012: Workshop on Current Trends in Cryptology[ expand ]



2012-03-09
13:54 [Event][New]WISA 2012: The 13th International Workshop on Information Security Applications[ expand ]
13:53 [Event][New]IEEE TIFS: SI on Privacy & Trust Management in Cloud & Distributed Systems[ expand ]
13:51 [Job][New]Post-Doctoral Fellowship, Ecole Normale Superieure de Lyon / INRIA[ expand ]
13:51 [Job][New]Scholarship/Student Jobs, Master in Computer Science, University of Luxembourg[ expand ]


2012-03-08
11:00 [Conf][PKC]PKC 2012 : Call for Participation[ expand ]


2012-03-06
10:43 [Conf][EC]Eurocrypt 2012 has now passed the 200 registrants milestone[ expand ]


2012-03-05
09:38 [Job][New]Research Fellow of Cryptography, University of Tartu, Estonia[ expand ]
06:19 [Event][Update]SECRYPT 2012: 9th International Conference on Security and Cryptography[ expand ]
06:15 [Event][New]SICK'12: IEEE LCN Workshop on Security in Communications Networks[ expand ]



2012-03-04
16:11 [Job][New]Ph.D studentship, School of Computing Science, Newcastle University, UK[ expand ]
14:04 [Conf][EC]Traditional English Treat : Homemade scones, jam and cream[ expand ]


2012-03-02
14:42 [Event][New]HotPETs'12: 5th Hot Topics in Privacy Enhancing Technologies[ expand ]
14:40 [Job][New]PhD student and Postdoc positions, Laboratory of Algorithmics, Cryptography and Security (LACS), University of Luxembourg[ expand ]
14:40 [Job][New]Funded PhD + Database architect position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France[ expand ]


2012-02-29
16:59 [Job][New]Funded PhD + Hardware designer position in industry (security-oriented), University Paris 1 - Panthéon Sorbonne. France[ expand ]


2012-02-27
16:15 [Event][New]DPM'12: 7th DPM International Workshop on Data Privacy Management[ expand ]
14:02 [Job][New]Ph.D. student, Université Jean Monnet - Saint-Etienne - France[ expand ]



2012-02-25
20:05 [Event][New]ACISP'12: The 17th Australasian Conference on Information Security and Privacy[ expand ]


2012-02-23
07:25 [PhD][New]Essam Ghadafi: Practical Privacy-Preserving Cryptographic Protocols[ expand ]
07:25 [PhD][New]Bogdan Warinschi[ expand ]
07:19 [Event][Update]Latincrypt 2012: Second International Conference on Cryptology and Information Security[ expand ]
07:17 [Event][New]Latincrypt 2012: Second International Conference on Cryptology and Information Security[ expand ]


2012-02-21
17:18 [Job][New]Post-doctoral Researchers , Queen’s University Belfast, Centre for Secure Information Technologies (CSIT), UK[ expand ]
06:30 [Event][Update]ICITS 2012: Sixth International Conference on Information-Theoretic Security[ expand ]
06:29 [Event][Update]ICITS: International Conference on Information Theoretic Security[ expand ]


2012-02-20
11:39 [Job][New]Post-Doc, Technicolor, Security Laboratories[ expand ]
10:49 [Event][New]SeCIHD'12: Int. Workshop on Security and Cognitive Informatics for Homeland Defense[ expand ]



2012-02-17
06:11 [Event][New]IWSEC2012: The 7th International Workshop on Security[ expand ]


2012-02-16
17:18 [Conf][TCC]TCC Student support[ expand ]
17:15 [Conf][TCC]Early Registration Deadline for TCC is today![ expand ]
16:42 [Event][Update]ISCISC '2012: 9th International ISC conference of Information Security and Cryptology[ expand ]
16:41 [Event][New]SAPSE '12: 4th IEEE International Workshop on Security Aspects of Process and Services[ expand ]


2012-02-15
21:03 [Conf][EC]All stipends for Eurocrypt have now been allocated[ expand ]
13:11 [Conf][EC]The Eurocrypt LNCS volume will be number 7237[ expand ]


2012-02-14
12:10 [Event][New]STAST2012: Socio-Technical Aspects of Security and Trust[ expand ]
12:09 [Job][New]Post Doctoral Fellowship , Hewlett Packard Labs, India[ expand ]



2012-02-13
20:54 [Event][New]Summer School on Tools[ expand ]
10:06 [News]Help needed! List of Crypto-Speakers[ expand ]


2012-02-11
14:07 [Event][New]YACC'12: Yet Another Conference on Cryptography[ expand ]


2012-02-09
23:23 [Event][New]TATRACRYPT '12: The 12th Central European Conference on Cryptology[ expand ]


2012-02-08
18:21 [Event][Update]PAIRING 2012: 5th International Conference on Pairing-Based Cryptography[ expand ]
10:27 [Event][New]Indocrypt 2012[ expand ]



2012-02-06
20:14 [Job][New]Ph.D. students, Nanyang Technological University, Singapore[ expand ]
20:14 [Job][New]Research Fellows, Nanyang Technological University, Singapore[ expand ]
15:30 [Job][New]Ph.D. student scholarship, Universitat Rovira i Virgili[ expand ]
06:21 [Event][Update]ACNS 2012: 10th International Conference on Applied Cryptography and Network Security[ expand ]
06:16 [Event][New]ISCISC '2012: 9th International ISC conference of Information Security and Cryptology[ expand ]


2012-02-05
06:32 [Job][Update]Faculty Positions in Computer Science, Ozyegin University, Istanbul, Turkey[ expand ]
06:32 [Job][New]Faculty Positions in Computer Science, Ozyegin University[ expand ]
06:31 [Job][New]Postdoc , Pennsylvania State University, University Park, PA, USA[ expand ]


2012-02-03
21:04 [Conf][Crypto]Crypto 2012 online submission is open[ expand ]


2012-02-02
16:33 [Event][New]SOWN2012: 2nd International Workshop on Security & Optimization for Wireless Networks[ expand ]
16:18 [Event][New]SECRYPT 2012: 9th International Conference on Security and Cryptography[ expand ]



2012-01-24
09:05 [Event][New]CMS'2012: Communications and Multimedia Security[ expand ]


2012-01-23
12:02 [Job][New]Senior Researcher / Post-Doc, TU Berlin[ expand ]


2012-01-22
13:06 [Event][Update]Asiacrypt 2012[ expand ]


2012-01-20
16:10 [Event][New]IEEE DEST-CEE 2012: 6th IEEE Inter. Conf. on Digital Ecosystems Technologies[ expand ]
15:42 [Job][New]Post-Doctoral Research Assistant in Cryptography, Information Security Group - Royal Holloway, University of London[ expand ]
14:41 [Job][New]Faculty positions, Saarland University, Saarbrücken, Germany[ expand ]



2012-01-19
13:06 [Event][New]IEEE ACS 2012: 2nd IEEE International Symposium on Anonymity and Communication Systems[ expand ]


2012-01-18
06:49 [Event][New](IJCSS): CFP - International Journal of Computer Science and Security[ expand ]


2012-01-14
13:11 [Event][New]SNDS 2012: Int Conference on Security in Computer Networks and Distributed Systems[ expand ]


2012-01-13
17:43 [Job][New]Postdoc Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany[ expand ]
17:43 [Job][New]PhD Positions in IT-Security/Privacy/Cryptography, Center for IT-Security, Privacy and Accountability (CISPA), Saarbrücken, Germany[ expand ]
09:23 [Event][New]SecIoT 2012: 2012 Workshop on the Security of the Internet of Things[ expand ]
08:26 [Event][New]MNCApps: International Conference on Advances in Mobile Network, Communication[ expand ]



2012-01-12
09:55 [Job][New]Doctoral Researcher in Cybersecurity (Resilient Critical Infrastructures), Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt[ expand ]
09:55 [Job][New]Post-Doc in Privacy & Trust (group leader, coordinator) , Technische Unitversität Darmstadt, CASED, the Center for Advanced Security Research Darmstadt[ expand ]
06:37 [Event][New]WCEBW2012: The World Congress on E-commerce and Business on the Web[ expand ]
06:33 [Job][New]Assistant/Associate Professor in Cryptography, Technical University of Denmark[ expand ]


2012-01-11
17:23 [Event][Update]SAC 2012: The Conference on Selected Areas in Cryptography[ expand ]
17:23 [Event][New]SAC 2012: The Conference on Selected Areas in Cryptography[ expand ]
08:57 [PhD][Update]Peter Schwabe: High-Speed Cryptography and Cryptanalysis[ expand ]
08:57 [PhD][New]Julia Borghoff: Cryptanalysis of Lightweight Ciphers[ expand ]
08:56 [PhD][New]Lars Ramkilde Knudsen[ expand ]
08:56 [PhD][New]Tanja Lange[ expand ]


2012-01-10
13:03 [Job][New]Ph.D. Students, Post-Docs, Intel-TU Darmstadt Security Institute, Germany[ expand ]


2012-01-08
17:01 [Conf][EC]Registration is now open[ expand ]



2012-01-06
05:06 [Event][New]NSS 2012: The 6th International Conference on Network and System Security[ expand ]


2012-01-05
07:36 [Event][Update]WAIFI 2012: International Workshop on the Arithmetic of Finite Fields[ expand ]


2012-01-04
16:34 [Job][New]Post-Doc, University of Bristol[ expand ]
08:03 [Event][New]FutureTech 2012: The 7th FTRA International Conference on Future Information Technology[ expand ]


2012-01-03
15:37 [Event][New]VI-MSS: Mathematical and Statistical Aspects of Cryptography[ expand ]
13:31 [Job][New]Post-Doc, Bar-Ilan University, Tel-Aviv Area, Israel[ expand ]
06:34 [News]Videos of IACR lectures in cryptodb and youtube[ expand ]



2012-01-02
22:08 [Event][Update]SEC '12: 21st USENIX Security Symposium[ expand ]
22:08 [Event][New]SEC '12: 21st USENIX Security Symposium (Crypt)[ expand ]
11:24 [Conf][EC]Eurocrypt Programme Now Available[ expand ]


2011-12-30
07:09 [Event][Update]Stream Ciphers: Special Issue on[ expand ]


2011-12-28
20:17 [Job][New]Senior researcher with a strong background on cryptology, Galician Research and Development Center in Advanced Telecommunications (GRADIANT) Vigo, Spain [ expand ]


2011-12-26
21:33 [Job][New]Ph.D. positions in applied cryptography / network security / privacy, University of Surrey, United Kingdom[ expand ]



2011-12-23
16:53 [Event][New]ICITeS'2012: 2nd IEEE International Conference on Information Technology a[ expand ]
08:04 [Job][New]Research Scientist, Temasek Laboratories, National University of Singapore[ expand ]
06:43 [Event][New]SHARCS 2012: Special-Purpose Hardware for Attacking Cryptographic Systems[ expand ]


2011-12-22
09:00 [Job][New]PhD position in Security of Industrial Control Systems, University of Twente[ expand ]
08:59 [Event][New]ESORICS 2012: 17th European Symposium on Research in Computer Security[ expand ]


2011-12-20
15:46 [PhD][New]Arshad Ali: New Attacks on FCSR-based Stream Ciphers[ expand ]


2011-12-19
21:38 [PhD][New]Robert Granger: On Small Degree Extension Fields in Cryptology[ expand ]
06:36 [Event][Update]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:34 [Event][New]ANTS-X: Tenth Algorithmic Number Theory Symposium[ expand ]



2011-12-18
16:12 [Conf][EC]List of Accepted Papers[ expand ]
11:00 [Job][New]Research Assistant in Secure Software Engineering, European Center for Security and Privacy by Design, Darmstadt, Germany[ expand ]


2011-12-16
12:12 [Job][New]Security Engineer and Consultant for Germany , ESCRYPT GmbH, Bochum/Munich/Wolfsburg, Germany[ expand ]


2011-12-15
22:52 [Conf]188 Submissions at PKC 2012[ expand ]
14:20 [Event][New]esIoT: International Workshop on Extending Seamlessly to the Internet of Things[ expand ]
05:49 [Job][New]Ph.D. and postdoctoral positions, IMDEA Software Institute, Spain[ expand ]


2011-12-14
21:02 [Job][New]Postdoctoral/ Research Fellow - Information Security group, University of Calgary[ expand ]
15:15 [Job][New]Security Engineer and Consultant for USA, ESCRYPT Inc., Ann Arbor, Michigan, USA[ expand ]
14:26 [PhD][New]Filipe Beato: Privacy Preserving Information Sharing in Online communities[ expand ]
10:35 [Job][New]Post-Doc in Information Security, University of Twente[ expand ]
10:35 [Job][New]Post-Doc in Security of Industrial Control Systems, University of Twente[ expand ]
06:28 [Job][New]Post-Doctoral or Research Professor Positions , Seoul National University, Korea[ expand ]
06:27 [Job][New]Two fully funded PhD student positions in Information Security, University off Twente[ expand ]



2011-12-12
05:21 [Job][New]Tenure-Track position in Information Security , University of Twente, The Netherlands[ expand ]


2011-12-11
10:20 [PhD][New]Souradyuti Paul: Design and Analysis of Stream Ciphers Based on Arrays and Modular Addition[ expand ]


2011-12-10
19:01 [Event][New]ICDIPC2012: 2nd Inter. Conference on Digital Information Processing and Communications[ expand ]


2011-12-09
10:24 [Job][New]Ph.D. student scholarships, Center for Advanced Security Research Darmstadt (CASED), Germany[ expand ]
10:24 [Job][New]Full professor in Computer Security, KTH Royal Institute of Technology[ expand ]
08:42 [Conf][EC]Eurocrypt Stipends[ expand ]



2011-12-08
06:22 [PhD][New]Florian Mendel: Analysis of Cryptographic Hash Functions[ expand ]


2011-12-06
20:44 [Conf][FSE]Registration Now Open[ expand ]


2011-12-04
15:54 [Event][New]PAIRING 2012: 5th International Conference on Pairing-Based Cryptography[ expand ]
07:01 [PhD][New]Karim Abdellatif: Hardware Architectures for Cryptography[ expand ]
07:01 [PhD][New]Habib Mehrez[ expand ]


2011-12-03
10:26 [Job][New]Software Security Engineer (All Levels), Qualcomm Incorporated[ expand ]
10:25 [Event][New]Inscrypt'2012: The 8th China International Conference on Information Security and Cryptolo[ expand ]



2011-12-02
10:01 [Event][New]HOST'12: IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST[ expand ]
07:45 [PhD][New]Christiane Peters: Curves, Codes, and Cryptography[ expand ]
05:17 [Event][Update]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]


2011-11-30
23:33 [Event][Update]TRUST 2012: 5th International Conference on Trust and Trustworthy Computing[ expand ]
23:32 [Event][New]RFIDSec'12: The 8th workshop of RFID security and privacy[ expand ]
23:30 [Job][New]PhD student, Norwegian Information Security Laboratory, GUC[ expand ]


2011-11-28
15:08 [Event][New]SECOTS 2012: Intl. Symposium on Security in Collaboration Technologies and Systems[ expand ]
15:06 [Job][New]Ph.D. Students and Post-Doc, University of Luxembourg[ expand ]


2011-11-25
13:58 [Conf][EC]Report on Eurocrypt 2011, May 15-19, 2011, Tallinn, Estonia [ expand ]
13:56 [Conf]Report on SECRYPT 2011, July 18-21, 2011, University of Seville, Spain[ expand ]
13:52 [Event][New]ARES 2012: 7th International Conference on Availability, Reliability and Security[ expand ]
09:42 [Event][New]ISCTURKEY2012: 5th International Conference on Information Security and Cryptology[ expand ]
08:20 [News]Newsletter Autumn 2011[ expand ]



2011-11-24
14:08 [Event][New]WISTP 2012: Sixth Workshop in Information Security Theory and Practice[ expand ]
06:17 [Job][New]Lecturer/Senior Lecturer, University of Wollongong, Australia[ expand ]


2011-11-23
09:42 [Conf][FSE]FSE 2012: 90 submissions received[ expand ]


2011-11-22
18:46 [Event][New]FIRST 2012: 24th Annual FIRST Conference on Computer Security and Incident Response[ expand ]


2011-11-20
16:32 [Job][New]Cryptography Architect, CipherCloud, Hyderabad, India[ expand ]
16:30 [Event][New]2nd Bar-Ilan Winter School on Cryptography: Lattice-Based Cryptography and[ expand ]



2011-11-18
06:49 [Event][Update]Is Cryptographic Theory Practically Relevant?[ expand ]
06:48 [Event][Update]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
06:44 [Event][New]Asiacrypt 2012[ expand ]
06:44 [Event][New]Crypto 2013[ expand ]
06:27 [Conf]Report on Theory of Cryptography Conference 2011 (TCC), March 28-30, 2011, Providence, RI, USA[ expand ]


2011-11-17
11:03 [Event][New]TRUST 2012[ expand ]
07:35 [Event][New]AIM'12: International Conference on Advanced IT, engineering and Management[ expand ]
06:52 [Conf]Africacrypt 2012[ expand ]
06:22 [Election]Results 2011[ expand ]


2011-11-16
12:29 [PhD][New]Berkant Ustaoglu: Key establishment - security models, protocols and usage[ expand ]
12:00 [Conf][FSE]FSE submission server will close in 24 hours (Nov. 17, 11:59 AM UTC)[ expand ]


2011-11-15
10:13 [News]Eli Biham to hold Distinguished Lecture 2013[ expand ]
10:12 [News]Dan Boneh to hold Distinguished Lecture 2012[ expand ]



2011-11-14
18:09 [Job][New]Experienced Researchers in Cryptology, Galician Research and Development Center in Advanced Telecommunications (Gradiant), Vigo, Spain[ expand ]
10:02 [Job][New]IT Hardware Security Engineer – Smartcards, APPLUS - LGAI DIVISION Barcelona[ expand ]


2011-11-12
15:24 [Conf]Report on Fault Diagnosis and Tolerance in Cryptography Workshop (FDTC 2011) September 28, 2011, Nara, Japan (ICW)[ expand ]


2011-11-11
14:48 [Conf]Report on Africacrypt 2011 (ICW)[ expand ]
13:13 [Event][Update]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]
06:43 [Conf]Report on CHES 2011, Nara, Japan, Sept 28-Oct 1[ expand ]
06:40 [Conf]Report on Public Key Cryptography 2011 (PKC), March 6-9, 2011, Taormina, Italy[ expand ]


2011-11-08
06:46 [Conf]Report on Crypto 2011[ expand ]
06:07 [Event][New]CSIA - 2012: The Third International Conference on Communications Security & Information[ expand ]



2011-11-07
16:34 [Event][New]CSP EU Forum: Cybersecurity and Privacy EU Forum 2012[ expand ]
10:56 [Conf]Report on SAC 2011, Ontario, Canada (ICW)[ expand ]


2011-11-04
12:47 [Job][New]Mathematicians , GCHQ, UK[ expand ]


2011-11-03
18:29 [PhD][New]Mark Manulis: Provably Secure Group Key Exchange[ expand ]
14:30 [Event][New]PST 2012: 10th Annual Conference on Privacy, Security and Trust[ expand ]
14:29 [Event][New]DBSEC 2012: 26th Annual WG 11.3 Conference on Data and Applications Security and Privac[ expand ]


2011-11-01
18:15 [Job][New]Mathematicians (graduate entry level), GCHQ, UK[ expand ]
16:34 [Event][New]SHA3@ISI: Hash Workshop on SHA3 Finalists[ expand ]



2011-10-29
15:29 [PhD][New]Yves Mathieu[ expand ]
15:26 [PhD][New]Laurent Sauvage: Cartographie électromagnétique pour la cryptanalyse physique[ expand ]


2011-10-28
17:41 [Job][New]Ph.D. Student, Signal Processing in Communications Group, University of Vigo, Spain[ expand ]
17:40 [Job][New]Technical Support Engineer - Encryption, Acumin[ expand ]


2011-10-27
20:38 [Conf]Report on InfoSecHiComNet 2011, October 19-22, Haldia, India[ expand ]


2011-10-25
19:31 [PhD][New]Nishanth Chandran: Theoretical Foundations of Position-Based Cryptography[ expand ]



2011-10-24
15:44 [Event][New]WMC2012: Third Workshop on Mathematical Cryptology[ expand ]
15:34 [Event][New]SCC2012: Third international conference on Symbolic Computation and Cryptography[ expand ]
15:09 [Event][New]CHES 2012: 14th International Workshop on Cryptographic Hardware and Embedded Systems[ expand ]


2011-10-22
15:52 [Event][New]ACE-2012: Third International Conference on Advances in Computer Engineering - ACE 20[ expand ]
15:50 [Job][New]Post-Doc, Ben-Gurion university, Beer-Sheva, Israel[ expand ]


2011-10-21
08:00 [Conf][FSE]FSE 2012 deadline: November 17, 11:59 AM UTC[ expand ]


2011-10-14
08:25 [Job][New]Post-Doc, University of British Columbia, Vancouver, Canada[ expand ]



2011-10-13
20:20 [Event][Update]Crypto 2012[ expand ]
15:26 [Job][Update]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
15:25 [Job][New]2 Ph.D. students, University of British Columbia, Vancouver, Canada[ expand ]
12:01 [Event][New]ProvSec 2012: The Sixth International Conference on Provable Security[ expand ]
11:50 [Job][New]Two Post-Docs, University of Luxembourg[ expand ]
06:38 [PhD][New]Mehmet Sabir Kiraz: Secure and Fair Two-Party Computation[ expand ]
06:37 [PhD][New]Berry Schoenmakers[ expand ]


2011-10-12
06:53 [Job][New]Research Scientist, National University of Singapore, Singapore[ expand ]
05:50 [Event][New]SETA 2012: The 7th International Conference on Sequences and Their Applications[ expand ]


2011-10-11
12:28 [Event][New]SCN 2012: 8th Conference on Security and Cryptography for Networks[ expand ]


2011-10-10
12:15 [Event][Update]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]



2011-10-07
19:45 [Election]15.2% participation within the first week[ expand ]
13:16 [Job][Update]MSc student, University of Warsaw[ expand ]
13:12 [Job][New]MSc student, University of Warsaw[ expand ]


2011-10-06
06:20 [Event][New]ICACM 2012: International Conference on Applied and Computational Mathematics[ expand ]
06:08 [Event][New]WAIFI 2012: International Workshop on the Arithmetic of Finite Fields[ expand ]


2011-10-05
16:19 [Job][New]Post-Doc Position in Information Security (Quantum Key Distribution), ID Quantique, Geneva, Switzerland[ expand ]
16:19 [Job][New]Post-Doc, Tel Aviv Universaity, Israel[ expand ]


2011-10-04
17:59 [Conf][EC]194 submissions at Eurocrypt[ expand ]



2011-10-03
20:31 [Event][New]DICTAP 2012: 2nd Digital Information & Communication Technology & its Applicatiions Conf[ expand ]
15:53 [Event][New]Third SHA-3 Candidate Conference[ expand ]


2011-10-01
17:46 [Election]6.3% participation within 24h [ expand ]


2011-09-29
04:51 [Job][New]3 Security Experts in Network/SW and HW/Smartcards, LGAI Applus+, Barcelona, Spain[ expand ]
04:50 [Job][New]PhD Studentship, University of Cambridge[ expand ]
04:50 [Job][New]PhD Studentship in Mobile Payments, University of Cambridge[ expand ]


2011-09-28
05:58 [PhD][Update]Mark D. Ryan: Ordered Presentations of Theories: A Hierarchical Approach to Default Reasoning[ expand ]
05:57 [PhD][New]Ben Smyth: Formal verification of cryptographic protocols with automated reasoning[ expand ]
05:57 [PhD][New]Mark D. Ryan[ expand ]



2011-09-27
22:01 [Job][New]Postdoc, Ruhr University Bochum[ expand ]


2011-09-25
16:07 [Election]List of Candidates Available[ expand ]
10:33 [Job][New]PhD in Network Security and Computer Forensics, University of Bristol[ expand ]


2011-09-23
11:48 [Job][New]Post-Doc, Computer Science and Technology Centre (CCTC) at Universidade do Minho, Braga, Portugal[ expand ]


2011-09-22
14:22 [Job][New]Four Post-Doc Positions in Security and Privacy, Universitat Rovira i Virgili[ expand ]
05:17 [Job][New]Post-Doc, University of Warsaw[ expand ]



2011-09-20
08:37 [PhD][New]Goutam Paul: Analysis and Design of RC4 and Its Variants[ expand ]
08:34 [Event][New]WiSec 2012: The Fifth ACM Conference on Wireless Network Security[ expand ]


2011-09-19
11:10 [Job][New]Ph.D. student, University of Luxembourg[ expand ]
08:22 [Job][New]Research Scientists , Institute for Infocomm Research, Singapore[ expand ]


2011-09-17
18:01 [Event][New]CFP - ISeCure Special Issue on Information Hiding[ expand ]


2011-09-16
16:27 [Job][Update]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]



2011-09-15
17:41 [PhD][New]Phan Duong Hieu: Sécurité et efficacité de schémas cryptographiques[ expand ]
17:38 [Job][New]Research Assistant/Research Associate in Cryptography (two posts), University of Bristol[ expand ]
17:37 [Event][New]PSD 2012: Privacy in Statistical Databases[ expand ]


2011-09-14
09:25 [Event][Update]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]
09:24 [Event][New]ACISP 2012: The 17th Australasian Conference on Information Security and Privacy[ expand ]


2011-09-12
13:48 [Job][New]Post-Doc, Ecole normale superieure, Paris, France[ expand ]


2011-09-09
22:25 [Event][New]Africacrypt 2012: Fifth international conference on Cryptology, Africacrypt 2012[ expand ]
05:34 [Event][Update]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
05:33 [Event][New]CANS 2011: The 10th International Conference on Cryptology and Network Security[ expand ]
04:50 [Job][New]PhD student , University Paris 7[ expand ]



2011-09-08
16:12 [Job][New]PhD or Post-Doc Position, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-09-07
11:03 [Job][New]Lecturer in Cybersecurity, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:02 [Job][Update]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen\'s University Belfast, UK[ expand ]
11:01 [Job][New]Professor of Secure Digital Systems, Centre for Secure Information Technologies (CSIT), Queen's University Belfast, UK[ expand ]
07:09 [Event][New]Stream Ciphers: Special Issue on "Stream Ciphers" in the journal CCDS, Springer[ expand ]
05:15 [Job][New]Senior Lecturer/Associate Professor, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-09-06
08:37 [Job][Update]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]


2011-09-05
10:53 [Job][New]Access Management and Cryptographic Operations Manager, A major UK payments/ credit organisation - Hampshire[ expand ]



2011-09-04
14:50 [PhD][Update]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]


2011-09-03
20:31 [PhD][New]Jens Groth: Honest Verifier Zero-Knowledge Arguments Applied[ expand ]
17:50 [News]Distinguished Lectures Online: Gus Simmons and Ron Rivest[ expand ]


2011-09-02
17:26 [PhD][Update]Thomas Schneider: Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
14:08 [PhD][New]Hans Ulrich Simon[ expand ]


2011-09-01
05:03 [Job][New]Post-Doc in Software Security/Cryptography, University of Arizona, Tucson AZ[ expand ]



2011-08-31
16:49 [PhD][Update]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
16:24 [Event][New]ECRYPT Workshop on Lightweight Cryptography[ expand ]


2011-08-30
20:28 [PhD][New]Gene Tsudik[ expand ]
20:28 [PhD][New]Emiliano De Cristofaro: Sharing Sensitive Information with Privacy[ expand ]
13:46 [PhD][New]Nicky Mouha: Analysis and Design of Cryptographic Hash Functions[ expand ]
04:48 [Job][New]Ph.D. Scholarships, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-29
09:23 [PhD][New]Jens Hermans: Lightweight public-key cryptography[ expand ]
07:59 [Event][New]SCIS 2012: The 29th Symposium on Cryptography and Information Security[ expand ]


2011-08-28
17:54 [News]Message from the IACR Board to the Japanese cryptologic community[ expand ]
17:53 [News]Message from the IACR Board w.r.t. CHES 2011[ expand ]
11:38 [Event][New]Is Cryptographic Theory Practically Relevant?[ expand ]



2011-08-27
23:05 [News][Book]Books Available for Review[ expand ]
20:03 [News][Review]New Book Reviews Available[ expand ]
18:58 [News]Membership Meeting Crypto 2011[ expand ]
18:20 [News]New Entries at the Archive[ expand ]
11:43 [Event][New]SEC 2012: 27th IFIP International Information Security and Privacy Conference[ expand ]
11:42 [Event][New]2011 AlKindi: The 2011 AlKindi Student Workshop on Cryptology[ expand ]


2011-08-26
12:15 [Election]IACR Elections: Nominations possible until September 18[ expand ]


2011-08-24
18:44 [Job][New]2 - 3 Research Fellow Positions, Nanyang Technological University, Singapore[ expand ]
18:43 [Job][New]Assistant Professor, Stevens Institute of Technology, Hoboken, NJ, USA[ expand ]
08:19 [Event][New]ICITS 2012: Sixth International Conference on Information-Theoretic Security[ expand ]


2011-08-23
17:24 [PhD][New]Chun-Yuan Hsiao: BUTTERFLY EFFECT IN CRYPTOGRAPHY: CONSEQUENCES OF CHANGES IN DEFINITIONS[ expand ]
16:46 [Event][New]COSADE '12: 3rd Int. Workshop on Constructive Side-Channel Analysis and Secure Design[ expand ]



2011-08-22
08:26 [Event][New]Inscrypt'2011: The 7th China International Conference on Information Security & Cryptolyo[ expand ]


2011-08-21
18:54 [Event][New]ISPEC 2012: The 8th Int. Conference on Information Security Practice and Experience[ expand ]


2011-08-20
10:16 [PhD][New]Pradeep Kumar Mishra: Studies on Efficient and Secure Implementation of Elliptic and Hyperelliptic Curve Cryptosystems[ expand ]
10:16 [PhD][New]Palash Sarkar[ expand ]
10:16 [PhD][New]Ero Balsa: Privacy in online social networks: analysis and solutions[ expand ]


2011-08-16
17:23 [PhD][New]Scott Russell: Communication and Query Privacy: Intrusion-Resilient Secure Channels and Private Database Queries[ expand ]
17:23 [PhD][New]Anthony Van Herrewege: Security components for trusted computer systems[ expand ]



2011-08-15
00:06 [Event][Update]TCC 2012: Ninth Theory of Cryptography Conference[ expand ]


2011-08-12
05:51 [Job][New]Postdoctoral Researcher, University of Maryland[ expand ]
05:50 [Job][New]Lecturer, Queensland University of Technology, Brisbane, Australia[ expand ]


2011-08-10
17:27 [PhD][New]Rafi Chen: New Techniques for Cryptanalysis of Cryptographic Hash Functions[ expand ]


2011-08-09
17:45 [PhD][Update]: Provable Security of Symmetric Primitives[ expand ]



2011-08-08
18:09 [PhD][New]Miroslav Knezevic: Efficient Hardware Implementations of Cryptographic Primitives[ expand ]
18:09 [PhD][New]Bart Mennink: Provable Security of Symmetric Primitives[ expand ]
18:07 [PhD][New]Yoni De Mulder: Design and Cryptanalysis of White-Box Implementations[ expand ]
18:07 [PhD][Update]: On Fairness in Secure Computation[ expand ]
11:21 [PhD][New]Carmela Troncoso: Design and analysis methods for privacy technologies[ expand ]
11:21 [PhD][New]Claudia Diaz[ expand ]
11:20 [PhD][New]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-07
14:22 [PhD][Update]Yevgeniy Vahlis: Black Box and White Box Cryptography[ expand ]


2011-08-06
16:58 [PhD][New]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]
16:58 [PhD][Update]Elke De Mulder: Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices[ expand ]


2011-08-05
20:50 [PhD][New]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
20:50 [PhD][New]Rene Govaerts[ expand ]
20:50 [PhD][New]Joos Vandewalle[ expand ]
20:50 [PhD][Update]Vincent Rijmen: Cryptanalysis and design of iterated block ciphers[ expand ]
13:52 [PhD][New]Roel Peeters: Study and Design of a Security Architecture for Things That Think[ expand ]
13:12 [PhD][New]Dave Singelee: Study and Design of a Security Architecture for Wireless Personal Area Networks[ expand ]
12:54 [PhD][New]Sebastiaan Indesteege: Analysis and Design of Cryptographic Hash Functions[ expand ]
06:31 [PhD][Update]Debdeep Mukhopadhyay: Design and Analysis of Cellular Automata Based Cryptographic Algorithms[ expand ]



2011-08-04
05:05 [Event][New]FloCon 2012: FloCon 2012 the 8th Annual Conference for Network Flow Analysis[ expand ]


2011-08-03
16:17 [PhD][Update]Leonid Reyzin: Zero-Knowledge with Public Keys[ expand ]


2011-08-02
11:28 [Job][Update]Ph.D studentship, Newcastle University[ expand ]
11:27 [Job][New]Ph.D studentship, Newcastle University[ expand ]


2011-07-30
18:42 [News]One-Time Pad was invented 35 years earlier by Frank Miller, not Vernam and Mauborgne[ expand ]



2011-07-27
15:07 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]
14:57 [Event][Update]PKC 2012: 15th Conference on Practice and Theory in Public Key Cryptography[ expand ]


2011-07-25
10:14 [Event][Update]FSE 2012: 19th International Workshop on fast software encryption[ expand ]
10:14 [Event][New]FSE 2012: 19th International Workshop on fast software encryption[ expand ]


2011-07-21
22:16 [Job][New]Ph.D. Scholarships, CASED / Darmstadt University of Technlogy, Germany[ expand ]
22:04 [PhD][New]S. Dov Gordon: On Fairness in Secure Computation[ expand ]
10:42 [PhD][New]Michael Hutter: Secure and Efficient Implementation of RFID Tags Supporting Cryptography[ expand ]


2011-07-19
14:56 [PhD][New]Urs Hengartner[ expand ]
14:56 [PhD][New]Jeremy Clark: Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections[ expand ]



2011-07-18
14:56 [Event][New]The science of secrecy: ciphers to cyberspace[ expand ]
13:27 [Job][New]Senior Researcher, Fraunhofer-Institut für Sichere Informationstechnologie, Darmstadt[ expand ]


2011-07-13
07:00 [Job][New]Two Postdocs, Information Security Group, Royal Holloway, University of London[ expand ]


2011-07-11
20:04 [Event][New]NordSec 2011: 16th Nordic Conference in Secure IT Systems[ expand ]
13:38 [Job][New]Post-doc in Computer Science or related area - Claude Shannon Fellow Program, Technische Universitaet Darmstadt[ expand ]


2011-07-10
21:34 [PhD][New]Dipanwita Roychowdhury[ expand ]
21:34 [Event][New]ASCrypto 2011: The Sao Paulo Advanced School of Cryptography[ expand ]
21:28 [PhD][New]Debdeep Mukhopadhyay[ expand ]
21:24 [PhD][New]Santosh Ghosh: Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields[ expand ]



2011-07-07
08:06 [Job][Update]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]
08:06 [Job][New]Research Scientists, Institute for Infocomm Research, Singapore[ expand ]


2011-07-06
20:51 [Event][New]HPGC'11: Workshop on Human centric computing, P2P, Grid and Cloud computing[ expand ]
20:51 [Event][New]NIAT 2011: Non-Invasive Attack Testing Workshop[ expand ]


2011-07-04
10:05 [Event][New]WSPCC: Workshop on Cloud Computing (WSPCC), IMSAA-2011 Conference [ expand ]


2011-07-03
19:05 [PhD][New]Stefan Brands: [ expand ]
19:05 [PhD][New]Mohamed Layouni: Privacy-preserving Personal Information Management[ expand ]



2011-06-30
23:21 [Event][New]DATE 2012: Design Automation and Test in Europe Conference[ expand ]
19:24 [Event][Update]Crypto 2012 (tentative)[ expand ]
07:43 [Event][New]Cryptology2012: The 3rd International Conference on Cryptology and Computer Security 2012[ expand ]


2011-06-29
09:17 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
09:16 [Event][Update]Crypto 2012 (tentative)[ expand ]
09:16 [Job][Update]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-28
07:59 [Job][New]Post-Doc, Universite Libre de Bruxelles[ expand ]


2011-06-27
18:39 [Event][New]CT-RSA 2012: Cryptographers' Track - RSA Conference 2012[ expand ]
05:38 [Job][New]Post-Doc, Data Storage Institute, A*STAR, Singapore[ expand ]



2011-06-26
14:57 [Event][New]10th International Conference on Applied Cryptography and Network Security (ACNS 2012)[ expand ]


2011-06-25
12:18 [Event][Update]Fourth International Conference on Post-Quantum Cryptography (PQCrypto 2011)[ expand ]


2011-06-23
16:37 [Job][Update]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]
16:37 [Job][New]Lecturer in Information Security, Royal Holloway, University of London, UK[ expand ]


2011-06-22
12:21 [Job][Update]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
04:42 [Event][New]Third International Workshop on Managing Insider Security Threats (MIST'11)[ expand ]



2011-06-21
15:03 [Event][New]IEEE Systems Journal - S. I. on Security and Privacy in Complex Systems (IEEE-SPCS)[ expand ]
06:16 [Event][Update]15th Conference on Practice and Theory in Public Key Cryptography (PKC 2012)[ expand ]


2011-06-20
09:28 [Job][New]1 Ph.D. Scholarship in Side-Channel and Fault Attacks, School of Physical and Mathematical Sciences @ Nanyang Technological University, Singapore[ expand ]
08:12 [PhD][Update]Marc Girault: Analysis and design of cryptographic and data coding algorithms[ expand ]


2011-06-19
17:48 [PhD][New]Cetin K. Koc: [ expand ]
17:47 [PhD][New]Gokay Saldamli: Spectral Modular Arithmetic[ expand ]
17:47 [PhD][New]Thomas A. Schmidt: [ expand ]


2011-06-18
22:18 [Event][Update]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]
14:32 [Event][New]The Third International Conference on Trusted Systems (INTRUST'11)[ expand ]



2011-06-17
10:09 [Event][New]The 14th International Conference on Information Security and Cryptology (ICISC 2011)[ expand ]


2011-06-15
15:57 [Event][New]1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011)[ expand ]


2011-06-14
15:46 [Event][Update]The 2nd Workshop on the Security of the Internet of Things (SecIoT 2011) (SecIoT11)[ expand ]
08:58 [Event][Update]Eurocrypt 2012[ expand ]


2011-06-13
11:22 [PhD][Update]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
11:22 [PhD][New]Louis Goubin [ expand ]
11:21 [PhD][New]Alexandre Berzati Cryptographic Analysis of Algorithm Corruptions[ expand ]
11:21 [PhD][Update]Alexandre BERZATI Cryptographic Analysis of Algorithm Corruptions[ expand ]



2011-06-11
14:22 [Event][New]Tenth Smart Card Research and Advanced Application Conference()[ expand ]


2011-06-10
10:51 [Event][New]3rd IEEE International Workshop on Privacy Aspects Of Data Mining(PADM 2011)[ expand ]


2011-06-09
19:57 [PhD][New]Francois Koeune Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators[ expand ]
19:57 [PhD][New]Christophe Petit Cryptographic hash functions from expander graphs[ expand ]
19:57 [PhD][New]Jean-Pierre Tignol [ expand ]
19:56 [PhD][Update]Jean-Pierre Tignol [ expand ]
15:56 [Event][New]8th European Workshop on Public Key Infrastructures, Services, and Applica ()[ expand ]


2011-06-08
08:35 [PhD][New]Juan González Nieto [ expand ]
08:34 [PhD][New]Colin Boyd [ expand ]
08:34 [PhD][Update]Juan González Nieto [ expand ]
08:34 [PhD][Update]Colin Boyd [ expand ]
08:34 [PhD][New]Malakondayya Choudary Gorantla Design and Analysis of Group Key Exchange Protocols[ expand ]
08:32 [Job][New]Product Securty Engineers (7 positions) ,Qualcomm Incorporated[ expand ]



2011-06-07
11:56 [Event][New]6th Data Privacy Management International Workshop()[ expand ]
11:56 [Event][New]4th International Workshop on Autonomous and Spontaneous Security()[ expand ]
09:57 [Event][New]Western European Workshop on Research in Cryptology()[ expand ]
09:34 [Event][New]Asian Workshop on Symmetric Key Cryptography(ASK 2011)[ expand ]
06:52 [PhD][New]Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms[ expand ]
06:34 [Event][New]Workshop on Information Security Applications()[ expand ]
05:09 [Event][New]Ninth Theory of Cryptography Conference()[ expand ]


2011-06-06
05:17 [Event][New]Symposium on Advances in Cryptography, Security and Applications()[ expand ]
05:17 [Event][New]2012 Financial Cryptography and Data Security Conference(FC'12)[ expand ]


2011-06-03
13:59 [Event][New]13th International Conference on Distributed Computing and Networking(ICDCN 2012)[ expand ]


2011-06-02
22:03 [PhD][New]Vassilis Zikas Generalized Corruption Models in Secure Multi-Party Computation[ expand ]



2011-06-01
16:58 [Event][New]Workshop on Security and Application for Embedded smart systems()[ expand ]
09:09 [PhD][New]Marina Samokhina The construction and research of cryptographic systems based on linear codes in projective metrics[ expand ]
09:09 [PhD][New]Ernst Gabidulin [ expand ]
09:06 [Event][New]ACM Workshop on Digital Rights Management(DRM 2011)[ expand ]


2011-05-31
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
09:48 [Job][New]Up to Six Post-Doc Positions ,Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-05-30
09:27 [PhD][Update]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
08:50 [Event][New]Workshop on Symmetric Cryptanalysis[ expand ]
08:07 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
08:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
07:18 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]


2011-05-27
14:49 [Event][New]Security Aspects in Info. Tech., High-Performance Computing & Networking()[ expand ]
14:22 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor: Implementation and Countermeasures.[ expand ]
14:21 [PhD][New]Selmane Nidhal Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures.[ expand ]



2011-05-26
13:27 [Job][New]Associate Professor ,Information Security Institute, Queensland University of Technology[ expand ]


2011-05-25
15:30 [Event][New]6th International Conference on Risks and Security of Internet and Systems(CRiSIS 2011)[ expand ]
09:00 [Event][New]Eurocrypt 2012[ expand ]
05:18 [Job][New]Research Scientist ,Institute for Infocomm Research (I2R), Singapore[ expand ]


2011-05-20
22:21 [PhD][New]Frank Lauren Hitchcock [ expand ]
22:21 [PhD][New]Claude Elwood Shannon An Algebra for Theoretical Genetics[ expand ]
06:52 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
06:51 [PhD][New]Frans Kaashoek [ expand ]
06:48 [PhD][Update]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]


2011-05-17
08:02 [PhD][New]Julien Bringer Nonlinearity of boolean functions: cryptographic applications of boolean functions and coding theory[ expand ]
07:59 [PhD][New]Philippe Langevin [ expand ]



2011-05-16
11:38 [PhD][New]Ehab Alnfrawy Towards an Efficient Public Key Cryptosystem[ expand ]
11:37 [PhD][New]Mohamed M. Abd-Eldayem [ expand ]
11:37 [PhD][New]Aly A. Fahmy [ expand ]


2011-05-15
05:40 [PhD][New]Eric Bone A Generalization of Pohlig-Hellman Simplification in Elliptic Curve Cryptography[ expand ]
05:38 [PhD][New]Fred Diamond [ expand ]


2011-05-12
13:12 [PhD][New]Jean Monnerat Short Undeniable Signatures: Design, Analysis, and Applications[ expand ]


2011-05-09
20:25 [PhD][New]Benny Chor [ expand ]
20:25 [PhD][New]Amos Beimel Secure Schemes for Secret Sharing and Key Distribution[ expand ]



2011-05-07
15:49 [PhD][New]Claude Barral Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography[ expand ]
15:48 [PhD][Update]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-05
06:30 [PhD][New]Dwaine Clarke Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data[ expand ]
06:29 [PhD][New]Srinivas Devadas [ expand ]
06:28 [PhD][New]Sumanta Chaudhuri Asynchronous FPGA Architectures for Cryptographic Applications[ expand ]


2011-05-04
11:06 [PhD][New]V.N.Krishna Addepalli Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security[ expand ]
06:00 [Job][New]Summer internship in applied security, encryption, and secure multiparty computation Ricoh Innovations[ expand ]


2011-05-03
11:15 [PhD][New]Jean-Luc Danger [ expand ]
06:00 [Job][New]Ph.D. or MS student Koç University, Turkey[ expand ]



2011-04-30
20:38 [PhD][New]Kerstin Lemke-Rust Models and Algorithms for Physical Cryptanalysis[ expand ]
20:38 [PhD][New]Patrick Longa High-Speed Elliptic Curve and Pairing-Based Cryptography[ expand ]


2011-04-29
18:09 [PhD][New]Sven Laur Cryptographic Protocol Design[ expand ]
18:08 [PhD][New]Kaisa Nyberg [ expand ]


2011-04-28
07:09 [PhD][New]Angus E. Taylor [ expand ]
07:09 [PhD][New]Lothrop Mittenthal Operator-Valued Polynomials in a Complex Variable, and, Generalizations of Spectral Theory[ expand ]
06:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-04-27
19:48 [PhD][New]Mohammad Mahmoody Studies in the Efficiency and (versus) Security of Cryptographic Tasks[ expand ]
19:48 [PhD][New]Boaz Barak [ expand ]
15:30 [PhD][New]Martin Simka Analysis and Implementation of Selected Blocks for Public-Key Cryptosystems in FPGAs[ expand ]
15:30 [PhD][New]Fischer Viktor Fast Methods of Digital Image Segmentation[ expand ]
15:30 [PhD][New]Drutarovsky Milos Signal Processors in Digital Signal Processing[ expand ]
15:27 [PhD][New]Yi Mu [ expand ]
15:26 [PhD][New]Andrew V. Sutherland Order Computations in Generic Groups[ expand ]
06:00 [Job][New]Teaching Fellow Royal Holloway, University of London[ expand ]



2011-04-26
12:12 [PhD][New]Mohammad Reza Reyhanitabar Contributions to the Theory and Application of Cryptographic Hash Functions[ expand ]
06:00 [Job][New]PhD Scholarship: CASED / Technische Universität Darmstadt[ expand ]


2011-04-25
14:47 [PhD][New]Qingsong Ye Privacy Preserving Dataset Operations[ expand ]
14:46 [PhD][New]Peter Schwabe High-Speed Cryptography and Cryptanalysis[ expand ]
14:46 [PhD][New]Daniel J. Bernstein [ expand ]
14:45 [PhD][New]Tanja Lange [ expand ]
14:25 [PhD][New]Susan Hohenberger Advances in Signatures, Encryption, and E-Cash from Bilinear Groups[ expand ]
14:25 [PhD][New]Kevin Fu Integrity and access control in untrusted content distribution networks[ expand ]
14:24 [PhD][New]Simon L. Garfinkel Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable[ expand ]
14:24 [PhD][New]Moses Liskov New Tools in Cryptography: Mutually Independent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration[ expand ]
14:24 [PhD][New]Jonathan Herzog Computational Soundness for Standard Assumptions of Formal Cryptography[ expand ]
14:24 [PhD][New]Stanislaw Jarecki Efficient Threshold Cryptosystems[ expand ]
14:24 [PhD][New]Leonid Reyzin Zero-Knowledge with Public Keys[ expand ]
14:24 [PhD][New]Zulfikar Ramzan A Study of Luby-Rackoff Ciphers[ expand ]
14:23 [PhD][New]Yevgeniy Dodis Exposure-Resilient Cryptography[ expand ]
14:23 [PhD][New]Victor Boyko On All-or-Nothing Transforms and Password-Authenticated Key Exchange Protocols[ expand ]
06:00 [Job][New]Systems Security Architect Qualcomm[ expand ]


2011-04-24
06:09 [PhD][New]Henri Gilbert [ expand ]
06:08 [PhD][New]Thomas Peyrin Analyse de fonctions de hachage cryptographiques[ expand ]


2011-04-22
20:57 [PhD][New]Michael de Mare Secure Set Membership Using 3SAT[ expand ]
20:55 [PhD][New]Rebecca Wright Achieving Perfect Secrecy Using Correlated Random Variables[ expand ]
19:05 [PhD][New]Michael Naehrig Constructive and Computational Aspects of Cryptographic Pairings[ expand ]
10:15 [PhD][New]Burton Stephen Kaliski Jr. Elliptic Curves and Cryptography: A Pseudorandom Bit Generator and Other Tools[ expand ]
10:14 [PhD][New]Ronald Linn Rivest [ expand ]
10:11 [PhD][New]Michael Sipser [ expand ]
06:00 [Job][New]Faculty positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]



2011-04-21
06:00 [Job][New]Post-doc Technische Universität Darmstadt[ expand ]
06:00 [Job][New]Two Post Doctoral Positions Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]


2011-04-20
15:29 [PhD][New]Dominique Schroeder On the Complexity of Blind Signatures[ expand ]
15:28 [PhD][New]Marc Fischlin [ expand ]
14:14 [PhD][New]Salil Vadhan A Study of Statistical Zero-Knowledge Proofs[ expand ]
14:13 [PhD][New]Deepak Kumar Dalai On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks[ expand ]
14:13 [PhD][New]Subhamoy Maitra [ expand ]
14:12 [PhD][New]Chiu Yuen Koo Studies on Fault-Tolerant Broadcast and Secure Computation[ expand ]
14:11 [PhD][New]Shien Jin Ong Unconditional Relationships within Zero Knowledge[ expand ]
14:11 [PhD][New]Shafi Goldwasser [ expand ]
14:09 [PhD][New]Andrey Bogdanov Analysis and Design of Block Cipher Constructions[ expand ]


2011-04-19
20:43 [PhD][New]Siamak Fayyaz Shahandashti Contributions to Secure and Privacy-Preserving Use of Electronic Credentials[ expand ]
20:42 [PhD][New]Vipul Goyal Stronger Notions of Secure Computation[ expand ]
20:41 [PhD][New]Amit Sahai [ expand ]
20:41 [PhD][New]Martin Novotný Time-Area Efficient Hardware Architectures for Cryptography and Cryptanalysis[ expand ]
20:40 [PhD][New]Jan Schmidt [ expand ]
13:30 [PhD][New]Kazuo Sakiyama Secure Design Methodology and Implementation for Embedded Public-key Cryptosystems[ expand ]
12:40 [PhD][New]Ian Goldberg [ expand ]
12:39 [PhD][New]Aniket Kate Distributed Key Generation and Its Applications[ expand ]
10:02 [PhD][New]Pierre-Alain Fouque Le partage de clés cryptographiques: Théorie et Pratique[ expand ]
09:47 [PhD][New]Mike Rosulek The Structure of Secure Multi-Party Computation[ expand ]
09:46 [PhD][New]Alptekin Küpçü Efficient Cryptography for the Next Generation Secure Cloud[ expand ]
09:45 [PhD][New]Anna Lysyanskaya Signature Schemes and Applications to Cryptographic Protocol Design[ expand ]
09:45 [PhD][New]Claudio Orlandi Secure Computation in Untrusted Environments[ expand ]
09:45 [PhD][New]Jan Denef [ expand ]
09:45 [PhD][New]Renaud Pacalet [ expand ]
09:45 [PhD][New]Sylvain Guilley Geometrical Countermeasures to Side-Channel Attacks[ expand ]
09:44 [PhD][New]Jonathan Katz Efficient Cryptographic Protocols Preventing Man-in-the-Middle Attacks[ expand ]
09:43 [PhD][New]Zvi Galil [ expand ]
09:42 [PhD][New]Moti Yung [ expand ]
09:42 [PhD][New]Alejandro Hevia Anonymity and Independence in Multiparty Protocols[ expand ]
09:42 [PhD][New]Frederik Vercauteren Computing zeta functions of curves over finite fields[ expand ]
06:00 [Job][New]Two postdoctoral positions in cyber-security Institute for Interdisciplinary Information Sciences, Tsinghua University, China[ expand ]


2011-04-18
15:30 [PhD][New]Marko Wolf Security Engineering for Vehicular IT Systems — Improving Trustworthiness and Dependability of Automotive IT Applications[ expand ]
15:30 [PhD][New]Andrea Röck Quantifying Studies of (Pseudo) Random Number Generation for Cryptography[ expand ]
15:29 [PhD][New]Nicolas Sendrier [ expand ]
15:29 [PhD][New]Martin Geisler Cryptographic Protocols: Theory and Implementation[ expand ]
15:28 [PhD][New]Ivan Damgård [ expand ]
15:28 [PhD][New]Brecht Wyseur White-Box Cryptography[ expand ]
15:27 [PhD][New]Bart Preneel Analysis and Design of Cryptographic Hash Functions[ expand ]
08:29 [PhD][New]Dalia Khader Attribute based authentication schemes[ expand ]
08:28 [PhD][New]Russell Bradford [ expand ]
08:28 [PhD][New]Sandeep S. Kumar Elliptic Curve Cryptography for Constrained Devices[ expand ]
08:27 [PhD][New]Christof Paar Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields[ expand ]
07:47 [PhD][New]Sylvain Pasini Secure communication using authenticated channels[ expand ]
07:47 [PhD][New]Jan Pelzl Practical Aspects of Curve-Based Cryptography and Cryptanalysis[ expand ]
06:00 [Job][New]Embedded Firmware Security Engineer Security Software Company, Israel (local)[ expand ]
05:48 [PhD][New]Crystal Lee Clough Square: A New Family of Multivariate Encryption Schemes[ expand ]
05:48 [PhD][New]Guomin Yang Security and Privacy in Wireless and Roaming Networks[ expand ]
05:48 [PhD][New]Duncan S. Wong [ expand ]
05:47 [PhD][New]Xiaotie Deng [ expand ]
05:46 [PhD][New]Andre Weimerskirch Authentication in Ad-hoc and Sensor Networks[ expand ]
05:44 [PhD][New]Dominique Unruh Protokollkomposition und Komplexität (Protocoll Composition and Complexity)[ expand ]
05:43 [PhD][New]Manoj Prabhakaran [ expand ]
05:43 [PhD][New]Michael Loui [ expand ]
05:40 [PhD][New]Jintai Ding [ expand ]
05:39 [PhD][New]Thomas Beth [ expand ]



2011-04-17
17:36 [PhD][New]Raminder Ruprai Improvements to the Gaudry-Schost Algorithm for Multidimensional discrete logarithm problems and Applications[ expand ]
17:35 [PhD][New]Manuel Blum [ expand ]
17:35 [PhD][New]Rene Peralta Three Results in Number Theory and Cryptography: 1. A New Algorithm to Compute Square Roots Modulo A Prime Number. 2. On the Bit Complexity of the Discrete Logarithm. 3. A Framew[ expand ]
12:22 [PhD][New]Huaxiong Wang [ expand ]
12:19 [PhD][New]Josef Pieprzyk [ expand ]
12:17 [PhD][New]Christophe Tartary Authentication for Multicast Authentication[ expand ]
10:47 [PhD][New]Wei Wu Cryptographic Protocols with Untrusted Third Party[ expand ]
10:47 [PhD][New]Willy Susilo Contributions to Fail-Stop Signature Schemes[ expand ]
10:45 [PhD][New]Turki F. Al-Somani Design and Analysis of Efficient and Secure Elliptic Curve Cryptoprocessors[ expand ]
10:45 [PhD][New]Alaaeldin A. Amin [ expand ]
10:44 [PhD][New]Elad Barkan Cryptanalysis of Ciphers and Protocols[ expand ]
10:44 [PhD][New]Eli Biham [ expand ]
10:44 [PhD][New]Stefano Tessaro Computational Indistinguishability Amplification[ expand ]
00:37 [PhD][New]Vijayakrishnan Pasupathinathan Hardware-based Identification and Authentication Systems[ expand ]
00:36 [PhD][New]Rungrat Wiangsripanawan Contributions to Mobility and Anonymity in IP Networks[ expand ]
00:36 [PhD][New]Xinyi Huang A Study of Undeniable Signatures and Their Variants[ expand ]
00:36 [PhD][New]Tsz Hon Yuen Contributions to Pairing-based Cryptography [ expand ]
00:33 [PhD][New]Rei Safavi-Naini [ expand ]


2011-04-16
23:24 [PhD][New]Man Ho Allen Au Contribution to Privacy-Preserving Cryptographic Techniques[ expand ]
23:10 [PhD][New]Waldyr Dias Benits Junior Applications of Fobenius Expansions in Elliptic Curve Cryptography[ expand ]
23:10 [PhD][New]Steven D. Galbraith [ expand ]
21:24 [PhD][New]Silvio Micali [ expand ]
21:19 [PhD][New]Brigitte Vallée [ expand ]
21:17 [PhD][New]David Pointcheval Proofs of Knowledge and Security Proofs (Les Preuves de Connaissance et leurs Preuves de Sécurité)[ expand ]
21:15 [PhD][New]Chris Peikert Cryptographic Error Correction[ expand ]
19:58 [PhD][New]M.L. Valarmathi [ expand ]
19:56 [PhD][New]R. Vimalathithan Cryptanalysis using Computational Intelligence[ expand ]
19:55 [PhD][New]Gil Segev The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks[ expand ]
19:54 [PhD][New]Moni Naor [ expand ]
19:54 [PhD][New]Claude Crépeau Correct and Private Reduction among Oblivious Transfers[ expand ]
19:15 [PhD][New]Mayank Varia Studies in Program Obfuscation[ expand ]
19:14 [PhD][New]Serge Vaudenay The Security of Cryptographic Primitives[ expand ]
19:12 [PhD][New]Marcio Juliato Fault Tolerant Cryptographic Primitives for Space Applications[ expand ]
19:12 [PhD][New]Catherine Gebotys [ expand ]
19:12 [PhD][New]Yevgeniy Vahlis Black Box and White Box Cryptography[ expand ]
19:12 [PhD][New]Charles Rackoff [ expand ]
19:12 [PhD][New]Jian Guo Analysis of Cryptographic Hash Functions[ expand ]
19:11 [PhD][New]Ran Canetti [ expand ]
19:11 [PhD][New]Rafail Ostrovsky Software Protection and Simulation on Oblivious RAMs. [ expand ]
19:10 [PhD][New]Josh Benaloh Verifiable Secret-Ballot Elections[ expand ]
19:09 [PhD][New]Michael Fischer [ expand ]
17:36 [PhD][New]Vadim Lyubashevsky Towards Practical Lattice-Based Cryptography[ expand ]
17:35 [PhD][New]Daniele Micciancio [ expand ]
17:22 [PhD][New]Alfred Menezes Elliptic Curve Cryptosystems[ expand ]
17:21 [PhD][New]Scott Vanstone [ expand ]
15:48 [PhD][New]Dr. A.Vinaya Babu [ expand ]


2011-04-15
05:45 [PhD][New]Dmitry Khovratovich New Approaches to the Cryptanalysis of Symmetric Primitives[ expand ]
05:44 [PhD][New]Alex Biryukov [ expand ]


2011-04-14
12:53 [PhD][New]Sunder Lal [ expand ]
12:52 [PhD][New]Douglas Stebila Classical Authenticated Key Exchange and Quantum Cryptography[ expand ]
12:52 [PhD][New]Michele Mosca [ expand ]
12:52 [PhD][New]Santosh Kumar Yadav Some Problems in Symmetric and Asymmetric Cryptography[ expand ]
06:00 [Job][New]Technical/Scientific Assistant University of Luxembourg[ expand ]



2011-04-13
06:00 [Job][New]Phd Position Cryptography Group, Dept Computer Science, University of Bristol, United Kingdom[ expand ]
06:00 [Job][New]Two Postdoc Positions in Security and Privacy Universitat Rovira i Virgili, Tarragona, Catalonia[ expand ]


2011-04-12
14:37 [PhD][New]Ashraf Masood [ expand ]
14:35 [PhD][New]Sondre Roenjom Cryptanalysis of Ciphers over Finite Cyclic Groups[ expand ]
14:34 [PhD][New]Tor Helleseth [ expand ]
11:25 [PhD][New]Santiago Zanella Beguelin Formal Certification of Game-Based Cryptographic Proofs[ expand ]


2011-04-11
15:26 [PhD][New]Sundar Lal [ expand ]
15:26 [PhD][New]Amit K Awasthi A Study of Some Delegated Digital Signature Schemes[ expand ]
14:59 [PhD][New]Christian Cachin Entropy Measures and Unconditional Security in Cryptography[ expand ]
14:58 [PhD][New]Mehreen Afzal Algebraic Cryptanalysis of Stream Ciphers with Non-linear Update[ expand ]
14:58 [PhD][New]Gaëtan Leurent Design and Analysis of Hash Functions[ expand ]
06:00 [Job][New]Senior Computer Security Researcher ICF International, Suburban Maryland near Washington, DC[ expand ]


2011-04-09
06:00 [Job][New]PhD students, Postdocs Aarhus University, Denmark[ expand ]



2011-04-07
06:00 [Job][New]5 years Post Doc position (3 years experience required) Computer Science and Technology Centre (CCTC) at Universidade do Minho, Portugal[ expand ]


2011-04-06
06:00 [Job][New]Full Professor (W3) chairing the research field Security of Integrated Hardware Technical University of Berlin[ expand ]


2011-04-05
06:00 [Job][New]PhD Studentship University of Bristol, Bristol, UK[ expand ]


2011-04-04
06:00 [Job][New]Post-Doc University of Luxembourg[ expand ]
06:00 [Job][New]Post-Doc Université catholique de Louvain (UCL, Belgium)[ expand ]
06:00 [Job][New]Associate or Assistant Professor in Cryptology Technical University of Denmark[ expand ]
06:00 [Job][New]Ph.D. student in Mathematics of Cryptography Macquarie University, Sydney, Australia[ expand ]



2011-03-22
06:00 [Job][New]Research Engineer Coding and Cryptography Research Group, Nanyang Technological University[ expand ]


2011-03-20
11:14 [PhD][New]Sungjun Park [ expand ]
11:13 [PhD][New]Jongin Lim [ expand ]
11:13 [PhD][New]Daejoon Hwang [ expand ]
11:13 [PhD][New]Jinwook Chung [ expand ]
11:13 [PhD][New]Dongho Won [ expand ]
11:13 [PhD][New]Seungjoo Kim Improved privacy and authenticity in digital signatures / key management[ expand ]


2011-03-16
20:05 [PhD][New]Fathy Helail [ expand ]
20:04 [PhD][New]Wafik Lotfallah [ expand ]
20:04 [PhD][New]Ghada Abdelhady New DES based on Elliptic Curve[ expand ]


2011-03-14
21:45 [PhD][New]Charles Bouillaguet Some attacks against hardness assumptions and cyptographic primitives[ expand ]
20:02 [PhD][New]Jayaprakash Kar Algorithms for Cryptographic Protocols Using Elliptic Curve Cryptography[ expand ]
06:00 [Job][New]Research Fellow Institute for Infocomm Research, Singapore[ expand ]



2011-03-10
07:00 [Job][New]Postdoc Macquarie Univ., Sydney[ expand ]


2011-03-09
22:13 [PhD][New]Markku-Juhani Olavi Saarinen Cryptanalysis of Dedicated Hash Functions[ expand ]
22:12 [PhD][New]Jiqiang Lu Cryptanalysis of block ciphers[ expand ]
22:10 [PhD][New]Chris Mitchell [ expand ]


2011-03-08
12:49 [PhD][New]Marc Girault [ expand ]
12:49 [PhD][New]Sébastien Canard Group signatures, variants and applications[ expand ]


2011-03-07
07:00 [Job][New]PhD. student Department of Computing, Macquarie University[ expand ]



2011-03-04
07:00 [Job][New]PhD Student ETH Zurich[ expand ]


2011-03-03
11:52 [PhD][New]Victor Lomne Power and Electro-Magnetic Side-Channel Attacks: threats and countermeasures[ expand ]
11:52 [PhD][New]Philippe Maurine [ expand ]
11:51 [PhD][New]Michel Robert [ expand ]


2011-03-01
07:09 [PhD][New]Ulrich Huber On Broadcast Encryption for Secure Software Delivery to Automobiles[ expand ]


2011-02-28
07:00 [Job][New]Assistant Professor, Cryptology and Information Security University of Versailles St-Quentin-en-Yvelines (France)[ expand ]



2011-02-25
07:00 [Job][New]PhD student CEA-LETI & UVSQ (Université de Versailles-St-Quentin-en-Yvelines)[ expand ]
06:17 [PhD][New]Yi Lu Applied Stream Ciphers in Mobile Communications[ expand ]


2011-02-24
19:02 [PhD][New]Luca De Feo Fast Algorithms for Towers of Finite Fields and Isogenies[ expand ]
19:02 [PhD][New]Éric Schost [ expand ]
19:01 [PhD][New]Marcos Antonio Simplicio Junior Message Authentication Algorithms for Wireless Sensor Networks[ expand ]
19:01 [PhD][New]François Morain [ expand ]


2011-02-23
07:00 [Job][New]1 PhD Position in Privacy-Oriented Cryptography (full-time researcher) Technische Universität Darmstadt, Center for Advanced Security Research Darmstadt, Germany[ expand ]


2011-02-22
10:26 [PhD][New]John Merriman [ expand ]
10:26 [PhD][New]Nigel Smart Computer Solution of Diophantine Equations[ expand ]



2011-02-20
15:57 [PhD][New]Keith Martin [ expand ]


2011-02-18
16:20 [PhD][New]Stefan Tillich Instruction Set Extensions for Support of Cryptography on Embedded Systems[ expand ]
10:13 [PhD][New]Joachim von zur Gathen [ expand ]
10:08 [PhD][New]Axel Poschmann Lightweight Cryptography - Cryptographic Engineering for a Pervasive Worls[ expand ]


2011-02-17
06:25 [PhD][New]Karl Christian Posch [ expand ]


2011-02-16
18:06 [PhD][New]Hae Yong Kim [ expand ]
17:06 [PhD][New]Jean-Philippe Aumasson Design and analysis of symmetric cryptographic algorithms [ expand ]
17:06 [PhD][New]Thomas Baignères Quantitative security of block ciphers: designs and cryptanalysis tools[ expand ]
17:06 [PhD][New]Joern Schweisgut Elektronische Wahlen unter dem Einsatz kryptografischer Observer - Electronic Elections with Cryptographic Observers[ expand ]
15:39 [PhD][New]Atefeh Mashatan Message Authentication and Recognition Protocols Using Two-Chanel Cryptography.[ expand ]
15:38 [PhD][New]Simon Fischer Analysis of lightweight stream ciphers[ expand ]
08:25 [PhD][New]Martin Vuagnoux Computer Aided Cryptanalysis from Ciphers to Side Channels[ expand ]
08:24 [PhD][New]Pascal Junod Statistical cryptanalysis of block ciphers[ expand ]
08:21 [PhD][New]Willi Meier [ expand ]
08:21 [PhD][New]David Mandell Freeman Constructing abelian varieties for pairing-based cryptography[ expand ]
08:20 [PhD][New]Edward Schaefer [ expand ]
08:20 [PhD][New]Kenneth Ribet [ expand ]



2011-02-15
18:04 [PhD][New]Ben Adida Advances in Cryptographic Voting Systems[ expand ]
17:59 [PhD][New]Edlyn Teske [ expand ]
17:58 [PhD][New]Douglas Stinson [ expand ]
17:58 [PhD][New]Stephen Weis New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing[ expand ]
07:00 [Job][New]PhD Studentships Centre for Secure Information Technologies (CSIT), Queens University Belfast, Belfast, UK[ expand ]
06:47 [PhD][New]Gilles Barthe [ expand ]
06:39 [PhD][New]Matthieu Rivain On the Physical Security of Cryptographic Implementations[ expand ]


2011-02-14
20:55 [PhD][New]Marc Joye Security analysis of RSA-type cryptosystems[ expand ]
20:53 [PhD][New]Jean-Jacques Quisquater [ expand ]
18:27 [PhD][New]Pierre-Yvan Liardet Ingénierie cryptographique Implantations sécurisées[ expand ]
18:06 [PhD][New]Gildas Avoine Cryptography in Radio Frequency Identification and Fair Exchange Protocols[ expand ]
17:54 [PhD][New]Helger Lipmaa Secure and Efficient Time-Stamping Systems[ expand ]
17:53 [PhD][New]Mati Tombak [ expand ]
17:49 [PhD][New]Tim Güneysu Cryptography and Cryptanalysis on Reconfigurable Devices[ expand ]
17:49 [PhD][New]Andy Rupp Computational Aspects of Cryptography and Cryptanalysis[ expand ]
17:40 [PhD][New]Han Vinck [ expand ]
09:54 [PhD][New]Jacques Stern [ expand ]
09:53 [PhD][New]Jean-Sebastien Coron Cryptanalysis and security proofs of public-key schemes.[ expand ]
08:51 [PhD][New]Birgit Pfitzmann [ expand ]
08:51 [PhD][New]Thomas Gross Browser-based Identity Federation[ expand ]
06:33 [PhD][New]Ueli Maurer [ expand ]
06:29 [PhD][New]Albrecht Beutelspacher Teilfaserungen und Parallelismen in endlichdimensionalen projektiven Räumen[ expand ]
00:31 [PhD][New]Jörg Schwenk [ expand ]
00:26 [PhD][New]Ingrid Verbauwhede VLSI Design Methodologies for the ASIC realization of cryptographic and algebraic systems[ expand ]


2011-02-13
18:28 [PhD][New]Benny Pinkas [ expand ]
18:27 [PhD][New]Thomas Schneider Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation[ expand ]
16:27 [PhD][New]Benedikt Gierlichs Statistical and Information-Theoretic Methods for Power Analysis on Embedded Cryptography[ expand ]


2011-02-12
18:16 [PhD][New]Christopher Wolf Multivariate Quadratic Polynomials in Public Key Cryptography[ expand ]



2011-02-11
11:55 [PhD][New]Ahmad-Reza Sadeghi [ expand ]


2011-02-10
19:37 [PhD][New]Johannes Blömer [ expand ]
12:16 [PhD][New]Maike Ritzenhofen Efficiently Calculating Small Solutions of Systems of Polynomial Equations - Lattice-Based Methods and Applications to Cryptography[ expand ]
12:14 [PhD][New]Claus-Peter Schnorr [ expand ]
12:13 [PhD][New]Alexander May New RSA Vulnerabilities Using Lattice Reduction Methods[ expand ]


2011-02-07
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]
07:00 [Job][New]Postdoctoral Research Associate University of North Carolina at Greensboro[ expand ]


2011-02-04
07:00 [Job][New]Researchers (Ph.D. student/Post-Doc) (No. 39) Technische Universität Darmstadt, Dep.of Comp. Science, Chair f. Sec. in Inf. Techn. (Prof. Waidner)[ expand ]



2011-02-03
07:00 [Job][New]Professorship in Mathematics, specialized Cryptography (5 year term) Department of Mathematics University of Turku[ expand ]
07:00 [Job][New]Associate Research Fellow University of Wollongong, Australia[ expand ]


2011-01-31
07:00 [Job][New]Ph. D. student Gemalto, La Ciotat, France[ expand ]


2011-01-22
07:00 [Job][New]Ph.D. Student or Postdoc Darmstadt University of Technlogy, Germany[ expand ]


2011-01-17
07:00 [Job][New]PhD Scholarships University of Wollongong, Australia[ expand ]



2011-01-13
07:00 [Job][New]Postdoc position in cryptography and IT security University of Luxembourg[ expand ]


2011-01-12
07:00 [Job][New]Security Architect ST Microelectronics, Rousset, France[ expand ]


2011-01-11
07:00 [Job][New]Ph.D. student Universitat Pompeu Fabra, Barcelona (Spain)[ expand ]
07:00 [Job][New]PhD Studentships University of Bristol, Bristol, UK[ expand ]


2011-01-07
07:00 [Job][New]Three tenured or tenure track positions Aalto University School of Science, Helsinki, Finland[ expand ]



2011-01-04
07:00 [Job][New]Professor/Assoc Prof/Asst Prof in Cryptology Information Security Department at MCS, National University of Sciences and Technology, Pakistan[ expand ]


2011-01-03
07:00 [Job][New]Ph.D. student University of Luxembourg[ expand ]


2010-12-20
07:00 [Job][New]Ph.D. student (open to Australian citizes and permanent residents) Macquarie University[ expand ]
07:00 [Job][New]Graduate Program in Cryptology Florida Atlantic University, CCIS, Boca Raton, Florida[ expand ]


2010-12-14
07:00 [Job][New]2 x Post-doctoral Research Positions Centre for Secure Information Technologies, Queens University Belfast[ expand ]



2010-12-09
07:00 [Job][New]Ph.D. student K.U.Leuven (Belgium)[ expand ]


2010-12-08
07:00 [Job][New]PostDoc in Cryptographic Protocols Norwegian University of Science and Technology (NTNU), Trondheim[ expand ]


2010-12-01
07:00 [Job][New]Full Professor Position in Cryptology GREYC - University of Caen, France[ expand ]


2010-11-29
07:00 [Job][New]Recruitment of Limited-term Researcher for April, 2011 National Institute of Information and Communications Technology (NICT)[ expand ]



2010-11-26
07:00 [Job][New]2 Ph.D. positions: Implementing Post-Quantum Algorithms Horst Görtz Institute, Ruhr University Bochum (Germany)[ expand ]


2010-11-25
07:00 [Job][New]Research Associate (postdoc) University College London[ expand ]


2010-11-23
07:00 [Job][New]Information Security and Cryptography Khalifa University, Abu Dhabi, UAE [ expand ]


2010-11-16
07:00 [Job][New]Post-Doc Boston University, Boston, MA, USA[ expand ]



2010-11-11
07:00 [Job][New]Lecturer, Senior Lecturer or Associate Professor Mathematics Department, University of Cape Town, Cape Town, South Africa[ expand ]


1970-01-01
00:00 3573[ expand ]
00:00 3573[ expand ]
00:00 3566[ expand ]
00:00 [ expand ]
00:00 [ expand ]
00:00 [ expand ]